First published: Mon Jan 15 2024(Updated: )
The WP Crowdfunding WordPress plugin before 2.1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Themeum WP Crowdfunding | <2.1.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6163 is considered a high severity vulnerability due to its potential for Stored Cross-Site Scripting attacks by high privilege users.
To fix CVE-2023-6163, update the WP Crowdfunding plugin to version 2.1.10 or later.
Users of the WP Crowdfunding WordPress plugin before version 2.1.10 are affected by CVE-2023-6163.
CVE-2023-6163 allows high privilege users to perform Stored Cross-Site Scripting attacks.
Yes, CVE-2023-6163 can be exploited in a multisite environment even when the unfiltered_html capability is disallowed.